[1]B. Alouffi, M. Hasnain, A. Alharbi, W. Alosaimi, H. Alyami, and M. Ayaz, "A systematic literature review on cloud computing security: Threats and mitigation strategies," IEEE Access, vol. 9, pp. 57792-57807, 2021.
[2]R. Swami, M. Dave, and V. Ranga, "Software-defined networking-based DDoS defense mechanisms," ACM Computing Surveys (CSUR), vol. 52, pp. 1-36, 2019.
[3]S. Velliangiri, P. Karthikeyan, and V. Vinoth Kumar, "Detection of distributed denial of service attack in cloud computing using the optimization-based deep networks," Journal of Experimental & Theoretical Artificial Intelligence, vol. 33, pp. 405-424, 2021.
[4]S. NAIEM, M. I. AMIRA, M. MARIE, E. K. AYMAN, I. GAMAL, H. ABDEL-GALIL, et al., "DDOS ATTACKS DEFENSE APPROACHES AND MECHANISM IN CLOUD ENVIROMENT," Journal of Theoretical and Applied Information Technology, vol. 100, 2022.
[5]S. Velliangiri and H. M. Pandey, "Fuzzy-Taylor-elephant herd optimization inspired Deep Belief Network for DDoS attack detection and comparison with state-of-the-arts algorithms," Future Generation Computer Systems, vol. 110, pp. 80-90, 2020.
[6]A. Bhardwaj, V. Mangat, R. Vig, S. Halder, and M. Conti, "Distributed denial of service attacks in cloud: State-of-the-art of scientific and commercial solutions," Computer Science Review, vol. 39, p. 100332, 2021.
[7]S. Kati, A. Ove, B. Gotipamul, M. Kodche, and S. Jaiswal, "Comprehensive Overview of DDOS Attack in Cloud Computing Environment using different Machine Learning Techniques," Available at SSRN 4096388, 2022.
[8]F. J. Abdullayeva, "Distributed denial of service attack detection in E-government cloud via data clustering," Array, p. 100229, 2022.
[9]K. Bhushan and B. B. Gupta, "Distributed denial of service (DDoS) attack mitigation in software defined network (SDN)-based cloud computing environment," Journal of Ambient Intelligence and Humanized Computing, vol. 10, pp. 1985-1997, 2019.
[10]P. Verma, S. Tapaswi, and W. W. Godfrey, "An adaptive threshold-based attribute selection to classify requests under DDoS attack in cloud-based systems," Arabian Journal for Science and Engineering, vol. 45, pp. 2813-2834, 2020.
[11]J. Singh and S. Behal, "Detection and mitigation of DDoS attacks in SDN: A comprehensive review, research challenges and future directions," Computer Science Review, vol. 37, p. 100279, 2020.
[12]A. Mishra and N. Gupta, "Supervised Machine Learning Algorithms Based on Classification for Detection of Distributed Denial of Service Attacks in SDN-Enabled Cloud Computing," in Cyber Security, Privacy and Networking, ed: Springer, 2022, pp. 165-174.
[13]B. Wang, Y. Zheng, W. Lou, and Y. T. Hou, "DDoS attack protection in the era of cloud computing and software-defined networking," Computer Networks, vol. 81, pp. 308-319, 2015.
[14]F. S. d. Lima Filho, F. A. Silveira, A. de Medeiros Brito Junior, G. Vargas-Solar, and L. F. Silveira, "Smart detection: an online approach for DoS/DDoS attack detection using machine learning," Security and Communication Networks, vol. 2019, 2019.
[15]N. M. Yungaicela-Naula, C. Vargas-Rosales, and J. A. Perez-Diaz, "SDN-based architecture for transport and application layer DDoS attack detection by using machine and deep learning," IEEE Access, vol. 9, pp. 108495-108512, 2021.
[16]M. Wang, Y. Lu, and J. Qin, "A dynamic MLP-based DDoS attack detection method using feature selection and feedback," Computers & Security, vol. 88, p. 101645, 2020.
[17]A. Patil and D. Kshirsagar, "Towards feature selection for detection of DDoS attack," in Computing in Engineering and Technology, ed: Springer, 2020, pp. 215-223.
[18]P. Verma, S. Tapaswi, and W. W. Godfrey, "A request aware module using CS-IDR to reduce VM level collateral damages caused by DDoS attack in cloud environment," Cluster Computing, vol. 24, pp. 1917-1933, 2021.
[19]A. Agarwal, M. Khari, and R. Singh, "Detection of DDOS attack using deep learning model in cloud storage application," Wireless Personal Communications, pp. 1-21, 2021.
[20]D. Alghazzawi, O. Bamasag, H. Ullah, and M. Z. Asghar, "Efficient detection of DDoS attacks using a hybrid deep learning model with improved feature selection," Applied Sciences, vol. 11, p. 11634, 2021.
[21]S. Haider, A. Akhunzada, I. Mustafa, T. B. Patel, A. Fernandez, K.-K. R. Choo, et al., "A deep CNN ensemble framework for efficient DDoS attack detection in software defined networks," Ieee Access, vol. 8, pp. 53972-53983, 2020.
[22]N. O. Ogwara, K. Petrova, and M. L. Yang, "Towards the Development of a Cloud Computing Intrusion Detection Framework Using an Ensemble Hybrid Feature Selection Approach," Journal of Computer Networks and Communications, vol. 2022, 2022.
[23]M. Aamir and S. M. A. Zaidi, "DDoS attack detection with feature engineering and machine learning: the framework and performance evaluation," International Journal of Information Security, vol. 18, pp. 761-785, 2019.
[24]T. A. Tuan, H. V. Long, L. H. Son, R. Kumar, I. Priyadarshini, and N. T. K. Son, "Performance evaluation of Botnet DDoS attack detection using machine learning," Evolutionary Intelligence, vol. 13, pp. 283-294, 2020.
[25]S. Dong and M. Sarem, "DDoS attack detection method based on improved KNN with the degree of DDoS attack in software-defined networks," IEEE Access, vol. 8, pp. 5039-5048, 2019.
[26]M. Zareapoor, P. Shamsolmoali, and M. A. Alam, "Advance DDOS detection and mitigation technique for securing cloud," International Journal of Computational Science and Engineering, vol. 16, pp. 303-310, 2018.
[27]A. Abusitta, M. Bellaiche, and M. Dagenais, "An SVM-based framework for detecting DoS attacks in virtualized clouds under changing environment," Journal of Cloud Computing, vol. 7, pp. 1-18, 2018.
[28]Jeba Praba. J, R. Sridaran "An SDN-based Decision Tree Detection (DTD) Model for Detecting DDoS Attacks in Cloud Environment," International Journal of Advanced Computer Science and Applications(IJACSA), vol. 13, pp. 54-64, 2022.
[29]ALDAPA, "gureKddcup and gureKddcup6percent dataset, Computer architecture and technology," University of basque Country 2019.